Sciweavers

2500 search results - page 264 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
NOSSDAV
2001
Springer
15 years 3 months ago
TCP-real: improving real-time capabilities of TCP over heterogeneous networks
We present a TCP-compatible and -friendly protocol which abolishes three major shortfalls of TCP for reliable multimedia applications over heterogeneous networks: (i) ineffective ...
Chi Zhang, Vassilios Tsaoussidis
INFOCOM
2000
IEEE
15 years 3 months ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
GLOBECOM
2009
IEEE
15 years 2 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
NSDI
2007
15 years 1 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
COLCOM
2008
IEEE
15 years 24 days ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart